I need a little help with the PR decoration, as it's not working for a new project

  • ALM - Azure DevOps
  • CI system used - Azure DevOps

I have just added a new project to our SonarCloud account, I followed the documentation as I have done many times before. But this time the PR decoration is not working.

To prove that it is working I have created a branch that should trigger Sonar, some commented-out code, and an if statement that is always false. SonarCloud picks them up but the PR does not get any comments to detail it’s findings. All the other projects worked fine first time, I must have missed something, can someone check if there are any errors posting back to Azure DevOps? Or is there anything I can check?

Hi,

Can you check your background task logs? Administration → Background Tasks → [row dots menu] and see if there are logs here.

 
Ann

I have found this:
`SonarCloud plugins:

  • IaC Code Quality and Security 1.20.0.5654 (iac)
  • PL/SQL Code Quality and Security 3.10.0.5282 (plsql)
  • Scala Code Quality and Security 1.14.0.4481 (sonarscala)
  • C# Code Quality and Security 9.10.0.77988 (csharp)
  • Vulnerability Analysis 10.2.0.22608 (security)
  • Java Code Quality and Security 7.24.0.32100 (java)
  • HTML Code Quality and Security 3.9.0.3600 (web)
  • Flex Code Quality and Security 2.10.0.3458 (flex)
  • XML Code Quality and Security 2.10.0.4108 (xml)
  • Text Code Quality and Security 2.4.0.2120 (text)
  • VB.NET Code Quality and Security 9.10.0.77988 (vbnet)
  • Swift Code Quality and Security 4.10.0.5999 (swift)
  • Python Code Quality and Security 4.8.0.12420 (python)
  • Dataflow Bug Detection Rules for Python 1.18.0.5108 (dbdpythonfrontend)
  • Dataflow Bug Detection 1.18.0.5108 (dbd)
  • Go Code Quality and Security 1.14.0.4481 (go)
  • JaCoCo 1.3.0.1538 (jacoco)
  • Dataflow Bug Detection Rules for Java 1.18.0.5108 (dbdjavafrontend)
  • T-SQL Code Quality and Security 1.10.0.5799 (tsql)
  • Apex Code Quality and Security 1.14.0.4481 (sonarapex)
  • JavaScript/TypeScript/CSS Code Quality and Security 10.6.0.22520 (javascript)
  • Ruby Code Quality and Security 1.14.0.4481 (ruby)
  • Vulnerability Rules for C# 10.2.0.22608 (securitycsharpfrontend)
  • Vulnerability Rules for Java 10.2.0.22608 (securityjavafrontend)
  • License for SonarLint 8.0.0.46953 (license)
  • Vulnerability Rules for JS 10.2.0.22608 (securityjsfrontend)
  • COBOL Code Quality 5.5.0.6450 (cobol)
  • Vulnerability Rules for Python 10.2.0.22608 (securitypythonfrontend)
  • PHP Code Quality and Security 3.32.0.10180 (php)
  • ABAP Code Quality and Security 3.13.0.4389 (abap)
  • Configuration detection for Code Quality and Security 1.3.0.654 (config)
  • Vulnerability Rules for PHP 10.2.0.22608 (securityphpfrontend)
    Project server settings:
  • sonar.abap.file.suffixes=.abap,.ab4,.flow,.asprog
  • sonar.apex.file.suffixes=.cls,.trigger
  • sonar.c.file.suffixes=.c,.h
  • sonar.cpp.file.suffixes=.cc,.cpp,.cxx,.c++,.hh,.hpp,.hxx,.h++,.ipp
  • sonar.cs.analyzeGeneratedCode=true
  • sonar.cs.file.suffixes=.cs,.razor
  • sonar.css.file.suffixes=.css,.less,.scss
  • sonar.flex.file.suffixes=as
  • sonar.go.file.suffixes=.go
  • sonar.html.file.suffixes=.html,.xhtml,.cshtml,.vbhtml,.aspx,.ascx,.rhtml,.erb,.shtm,.shtml,.cmp,.twig
  • sonar.java.file.suffixes=.java,.jav
  • sonar.javascript.file.suffixes=.js,.jsx,.cjs,.mjs,.vue
  • sonar.json.file.suffixes=.json
  • sonar.jsp.file.suffixes=.jsp,.jspf,.jspx
  • sonar.kotlin.file.suffixes=.kt,.kts
  • sonar.objc.file.suffixes=.m
  • sonar.php.file.suffixes=php,php3,php4,php5,phtml,inc
  • sonar.plsql.file.suffixes=sql,tab,pkb
  • sonar.pullrequest.provider=Azure DevOps Services
  • sonar.pullrequest.vsts.token.secured=******
  • sonar.python.file.suffixes=py
  • sonar.ruby.file.suffixes=.rb
  • sonar.scala.file.suffixes=.scala
  • sonar.swift.file.suffixes=.swift
  • sonar.terraform.file.suffixes=.tf
  • sonar.tsql.file.suffixes=.tsql
  • sonar.typescript.file.suffixes=.ts,.tsx,.cts,.mts
  • sonar.vbnet.file.suffixes=.vb
  • sonar.xml.file.suffixes=.xml,.xsd,.xsl,.config
  • sonar.yaml.file.suffixes=.yaml,.yml
    Project scanner properties:
  • sonar.host.url=https://sonarcloud.io/
  • sonar.modules=211A414A-B56A-41A4-BF75-07BA6D07D6F7,945A32CF-3A2A-4E99-9191-23EB537AC4AF
  • sonar.organization=aesseal
  • sonar.projectBaseDir=D:\a\1\s
  • sonar.projectKey=brighty
  • sonar.projectVersion=1.0
  • sonar.pullrequest.base=main
  • sonar.pullrequest.branch=features/34013-test-sonar-detection-prevent-pr-complete
  • sonar.pullrequest.cache.basepath=D:\a\1\s
  • sonar.pullrequest.key=10083
  • sonar.pullrequest.provider=vsts
  • sonar.pullrequest.vsts.instanceUrl=Azure DevOps Services | Sign In
  • sonar.pullrequest.vsts.project=AESSEAL Assistant
  • sonar.pullrequest.vsts.repository=AESSEAL Assistant
  • sonar.scanAllFiles=true
  • sonar.scanner.app=ScannerMSBuild
  • sonar.scanner.appVersion=5.13
  • sonar.scanner.metadataFilePath=D:\a_temp\sonar\50616\483daaf2-b659-73a6-ec15-a45b05fdea15\report-task.txt
  • sonar.sourceEncoding=windows-1252
  • sonar.token=******
  • sonar.visualstudio.enable=false
  • sonar.working.directory=D:\a\1.sonarqube\out.sonar
    Scanner properties of module: brighty:brighty:945A32CF-3A2A-4E99-9191-23EB537AC4AF
  • sonar.cs.analyzer.projectOutPaths=“D:\a\1.sonarqube\out\1”
  • sonar.cs.roslyn.reportFilePaths=“D:\a\1.sonarqube\out\1\Issues.json”
  • sonar.moduleKey=brighty:brighty:945A32CF-3A2A-4E99-9191-23EB537AC4AF
  • sonar.projectBaseDir=D:\a\1\s\AESSEAL_Assistant_Tests
  • sonar.projectKey=brighty:brighty:945A32CF-3A2A-4E99-9191-23EB537AC4AF
  • sonar.projectName=AESSEAL_Assistant_Tests
  • sonar.sourceEncoding=utf-8
  • sonar.sources=
  • sonar.tests=“D:\a\1\s\AESSEAL_Assistant_Tests\DevOpsServiceTests.cs”,“D:\a\1\s\AESSEAL_Assistant_Tests\KeyVaultTests.cs”,“D:\a\1\s\AESSEAL_Assistant_Tests\OpenAIServiceTests.cs”,“D:\a\1\s\AESSEAL_Assistant_Tests\SearchServiceTests.cs”,“D:\a\1\s\AESSEAL_Assistant_Tests\TableStoreServiceTests.cs”,“D:\a\1\s\AESSEAL_Assistant_Tests\Usings.cs”
  • sonar.working.directory=D:\a\1.sonarqube\out.sonar\mod1
    Scanner properties of module: brighty:brighty:211A414A-B56A-41A4-BF75-07BA6D07D6F7
  • sonar.cs.analyzer.projectOutPaths=“D:\a\1.sonarqube\out\0”
  • sonar.cs.roslyn.reportFilePaths=“D:\a\1.sonarqube\out\0\Issues.json”
  • sonar.moduleKey=brighty:brighty:211A414A-B56A-41A4-BF75-07BA6D07D6F7
  • sonar.projectBaseDir=D:\a\1\s\WebApp
  • sonar.projectKey=brighty:brighty:211A414A-B56A-41A4-BF75-07BA6D07D6F7
  • sonar.projectName=AESSEAL_Assistant
  • sonar.sourceEncoding=utf-8
  • sonar.sources=“D:\a\1\s\WebApp\AzureClientFactoryBuilderExtensions.cs”,“D:\a\1\s\WebApp\Controllers\ChatsController.cs”,“D:\a\1\s\WebApp\Controllers\OpenAIController.cs”,“D:\a\1\s\WebApp\Controllers\SearchController.cs”,“D:\a\1\s\WebApp\Extensions\ProjectBoardsExtension.cs”,“D:\a\1\s\WebApp\Models\bugFunctionmodel.cs”,“D:\a\1\s\WebApp\Models\ChatMessageLog.cs”,“D:\a\1\s\WebApp\Models\ChatMessageModel.cs”,“D:\a\1\s\WebApp\Models\FacetValue.cs”,“D:\a\1\s\WebApp\Models\pbiFunctionmodel.cs”,“D:\a\1\s\WebApp\Models\ProjectBoards.cs”,“D:\a\1\s\WebApp\Models\SearchFilter.cs”,“D:\a\1\s\WebApp\Models\searchFunctionmodel.cs”,“D:\a\1\s\WebApp\Models\SearchOutput.cs”,“D:\a\1\s\WebApp\Models\SearchResultModel.cs”,“D:\a\1\s\WebApp\Models\SessionChatMessage.cs”,“D:\a\1\s\WebApp\Models\SprintInformationFunctionModel.cs”,“D:\a\1\s\WebApp\Models\SprintModel.cs”,“D:\a\1\s\WebApp\MyFeatureFlags.cs”,“D:\a\1\s\WebApp\Pages\Error.cshtml.cs”,“D:\a\1\s\WebApp\Program.cs”,“D:\a\1\s\WebApp\Services\DevOpsService.cs”,"D:\a.…
  • sonar.working.directory=D:\a\1.sonarqube\out.sonar\mod0`

Hi,

So there was no option for logs?

And how did you configure this project for analysis? Through the in-app wizard?

 
Thx,
Ann